mirror of
https://github.com/SamyRai/tercul-backend.git
synced 2025-12-27 04:01:34 +00:00
This commit increases the test coverage of the `internal/app/work` package from 73.1% to over 80% by adding new tests and fixing a bug discovered during testing. The following changes were made: - Added tests for the `ListByCollectionID` query in `queries_test.go`. - Added a unit test for the `NewService` constructor in `service_test.go`. - Added tests for authorization, unauthorized access, and other edge cases in the `UpdateWork`, `DeleteWork`, and `MergeWork` commands in `commands_test.go`. - Fixed a bug in the `mergeWorkStats` function where it was not correctly creating stats for a target work that had no prior stats. This was discovered and fixed as part of writing the new tests. - Updated the `analytics.Service` interface and its mock implementation to support the bug fix.
73 lines
2.2 KiB
Go
73 lines
2.2 KiB
Go
package sql
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"tercul/internal/domain"
|
|
"tercul/internal/platform/config"
|
|
"time"
|
|
|
|
"go.opentelemetry.io/otel"
|
|
"go.opentelemetry.io/otel/trace"
|
|
"gorm.io/gorm"
|
|
)
|
|
|
|
type passwordResetRepository struct {
|
|
domain.BaseRepository[domain.PasswordReset]
|
|
db *gorm.DB
|
|
tracer trace.Tracer
|
|
}
|
|
|
|
// NewPasswordResetRepository creates a new PasswordResetRepository.
|
|
func NewPasswordResetRepository(db *gorm.DB, cfg *config.Config) domain.PasswordResetRepository {
|
|
return &passwordResetRepository{
|
|
BaseRepository: NewBaseRepositoryImpl[domain.PasswordReset](db, cfg),
|
|
db: db,
|
|
tracer: otel.Tracer("password_reset.repository"),
|
|
}
|
|
}
|
|
|
|
// GetByToken finds a reset by token (only unused and non-expired)
|
|
func (r *passwordResetRepository) GetByToken(ctx context.Context, token string) (*domain.PasswordReset, error) {
|
|
ctx, span := r.tracer.Start(ctx, "GetByToken")
|
|
defer span.End()
|
|
var reset domain.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("token = ? AND used = ? AND expires_at > ?", token, false, time.Now()).First(&reset).Error; err != nil {
|
|
if errors.Is(err, gorm.ErrRecordNotFound) {
|
|
return nil, ErrEntityNotFound
|
|
}
|
|
return nil, err
|
|
}
|
|
return &reset, nil
|
|
}
|
|
|
|
// GetByUserID finds resets by user ID
|
|
func (r *passwordResetRepository) GetByUserID(ctx context.Context, userID uint) ([]domain.PasswordReset, error) {
|
|
ctx, span := r.tracer.Start(ctx, "GetByUserID")
|
|
defer span.End()
|
|
var resets []domain.PasswordReset
|
|
if err := r.db.WithContext(ctx).Where("user_id = ?", userID).Find(&resets).Error; err != nil {
|
|
return nil, err
|
|
}
|
|
return resets, nil
|
|
}
|
|
|
|
// DeleteExpired deletes expired resets
|
|
func (r *passwordResetRepository) DeleteExpired(ctx context.Context) error {
|
|
ctx, span := r.tracer.Start(ctx, "DeleteExpired")
|
|
defer span.End()
|
|
if err := r.db.WithContext(ctx).Where("expires_at < ?", time.Now()).Delete(&domain.PasswordReset{}).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// MarkAsUsed marks a reset as used
|
|
func (r *passwordResetRepository) MarkAsUsed(ctx context.Context, id uint) error {
|
|
ctx, span := r.tracer.Start(ctx, "MarkAsUsed")
|
|
defer span.End()
|
|
if err := r.db.WithContext(ctx).Model(&domain.PasswordReset{}).Where("id = ?", id).Update("used", true).Error; err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
} |